サポートと今すぐチャット
サポートとのチャット

Identity Manager 9.2.1 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory environments Synchronizing an Azure Active Directory environment
Setting up initial synchronization with an Azure Active Directory tenant Adjusting the synchronization configuration for Azure Active Directory environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Azure Active Directory user accounts and identities Managing memberships in Azure Active Directory groups Managing Azure Active Directory administrator roles assignments Managing Azure Active Directory subscription and Azure Active Directory service plan assignments
Displaying enabled and disabled Azure Active Directory service plans forAzure Active Directory user accounts and Azure Active Directory groups Assigning Azure Active Directory subscriptions to Azure Active Directory user accounts Assigning disabled Azure Active Directory service plans to Azure Active Directory user accounts Inheriting Azure Active Directory subscriptions based on categories Inheritance of disabled Azure Active Directory service plans based on categories
Login credentials for Azure Active Directory user accounts Azure Active Directory role management
Azure Active Directory role management tenants Enabling new Azure Active Directory role management features Azure Active Directory role main data Displaying Azure Active Directory scoped role assignments Displaying scoped role eligibilities for Azure Active Directory roles Overview of Azure Active Directory scoped role assignments Main data of Azure Active Directory scoped role assignments Managing Azure Active Directory scoped role assignments Adding Azure Active Directory scoped role assignments Editing Azure Active Directory scoped role assignments Deleting Azure Active Directory scoped role assignments Assigning Azure Active Directory scoped role assignments Assigning Azure Active Directory system roles to scopes through role assignments Assigning Azure Active Directory business roles to scopes though role assignments Assigning Azure Active Directory organizations to scopes through role assignments Overview of Azure Active Directory scoped role eligibilities Main data of Azure Active Directory scoped role assignments Managing Azure Active Directory scoped role eligibilities Adding Azure Active Directory scoped role eligibilities Editing Azure Active Directory scoped role eligibilities Deleting Azure Active Directory scoped role eligibilities Assigning Azure Active Directory scoped role eligibilities Assigning Azure Active Directory system roles to scopes through role eligibilities Assigning Azure Active Directory business roles to scopes though role eligibilities Assigning Azure Active Directory organizations to scopes through role eligibilities
Mapping Azure Active Directory objects in One Identity Manager
Azure Active Directory core directories Azure Active Directory user accounts Azure Active Directory user identities Azure Active Directory groups Azure Active Directory administrator roles Azure Active Directory administrative units Azure Active Directory subscriptions and Azure Active Directory service principals Disabled Azure Active Directory service plans Azure Active Directory app registrations and Azure Active Directory service principals Reports about Azure Active Directory objects
Handling of Azure Active Directory objects in the Web Portal Recommendations for federations Basic configuration data for managing an Azure Active Directory environment Troubleshooting Configuration parameters for managing an Azure Active Directory environment Default project template for Azure Active Directory Editing Azure Active Directory system objects Azure Active Directory connector settings

Predefined password policies

You can customize predefined password policies to meet your own requirements if necessary.

Password for logging in to One Identity Manager

The One Identity Manager password policy is applied for logging in to One Identity Manager. This password policy defines the settings for the system user passwords (DialogUser.Password and Person.DialogUserPassword) as well as the passcode for a one time log in on the Web Portal (Person.Passcode).

NOTE: The One Identity Manager password policy is marked as the default policy. This password policy is applied if no other password policy can be found for identities, user accounts, or system users.

For more information about password policies for identities, see the One Identity Manager Identity Management Base Module Administration Guide.

Password policy for forming identities' central passwords

An identity's central password is formed from the target system specific user accounts by respective configuration. The Identity central password policy defines the settings for the (Person.CentralPassword) central password. Members of the Identity Management | Identities | Administrators application role can adjust this password policy.

IMPORTANT: Ensure that the Identity central password policy does not violate the target system-specific requirements for passwords.

For more information about password policies for identities, see the One Identity Manager Identity Management Base Module Administration Guide.

Password policies for user accounts

Predefined password policies are provided, which you can apply to the user account password columns of the user accounts.

IMPORTANT: If you do not use password policies that are specific to the target system, the One Identity Manager password policy default policy applies. In this case, ensure that the default policy does not violate the target systems requirements.

NOTE: When you update One Identity Manager version 7.x to One Identity Manager version 9.2.1, the configuration parameter settings for forming passwords are passed on to the target system-specific password policies.

The Azure Active Directory password policy is predefined for Azure Active Directory. You can apply this password policy to Azure Active Directory user accounts (AADUser.Password) of an Azure Active Directory tenant.

If the tenants' password requirements differ, it is recommended that you set up your own password policies for each tenant.

Furthermore, you can apply password policies based on the account definition of the user accounts or based on the manage level of the user accounts.

Using password policies

The Azure Active Directory password policy is predefined for Azure Active Directory. You can apply this password policy to Azure Active Directory user accounts (AADUser.Password) of an Azure Active Directory tenant.

If the tenants' password requirements differ, it is recommended that you set up your own password policies for each tenant.

Furthermore, you can apply password policies based on the account definition of the user accounts or based on the manage level of the user accounts.

The password policy that is to be used for a user account is determined in the following sequence:

  1. Password policy of the user account's account definition.

  2. Password policy of the user account's manage level.

  3. Password policy of the user account's tenant.

  4. The One Identity Manager password policy (default policy).

IMPORTANT: If you do not use password policies that are specific to the target system, the One Identity Manager password policy default policy applies. In this case, ensure that the default policy does not violate the target systems requirements.

To reassign a password policy

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Password policies category.

  2. Select the password policy in the result list.
  3. Select Assign objects.
  4. Click Add in the Assignments section and enter the following data.

    • Apply to: Application scope of the password policy.

      To specify an application scope

      1. Click next to the field.

      2. Select one of the following references under Table:

        • The table that contains the base objects of synchronization.

        • To apply the password policy based on the account definition, select the TSBAccountDef table.

        • To apply the password policy based on the manage level, select the TSBBehavior table.

      3. Under Apply to, select the table that contains the base objects.

        • If you have selected the table containing the base objects of synchronization, next select the specific target system.

        • If you have selected the TSBAccountDef table, next select the specific account definition.

        • If you have selected the TSBBehavior table, next select the specific manage level.

      4. Click OK.

    • Password column: Name of the password column.

    • Password policy: Name of the password policy to use.

  5. Save the changes.

To change a password policy's assignment

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Password policies category.

  2. Select the password policy in the result list.

  3. Select the Assign objects task.

  4. In the Assignments pane, select the assignment you want to change.

  5. From the Password Policies menu, select the new password policy you want to apply.

  6. Save the changes.

Creating password policies

Predefined password policies are supplied with the default installation that you can use or customize if required. You can also define your own password policies.

To create a password policy

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Password policies category.

  2. Click in the result list.

  3. On the main data form, enter the main data of the password policy.

  4. Save the changes.
Detailed information about this topic

Editing password policies

Predefined password policies are supplied with the default installation that you can use or customize if required.

To edit a password policy

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Password policies category.

  2. In the result list, select the password policy.

  3. Select the Change main data task.

  4. Edit the password policy's main data.

  5. Save the changes.
Detailed information about this topic
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択